Key Assets

Threats

Existing Controls

Likelihood

Consequence

Level of Risk

User login information and records

Unauthorized access of passwords and username

Encryption of passwords

Possible

Moderate

Medium

Backup storage

Corruption, loss of information

Firewalls, Encryption

Possible

Moderate

Medium

Cloud service

Attacks affecting the system

Firewalls, Encryption

Possible

Moderate

Medium

Internet Service provider

Attacks affecting the system.

Firewalls, Encryption

Possible

Minor

Medium

Policies and Procedures

Unauthorized modification of information

Annual reviews and check ins

Rare

Insignificant

Low